{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:32:28Z","timestamp":1725669148856},"publisher-location":"Berlin, Heidelberg","reference-count":66,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642289194"},{"type":"electronic","value":"9783642289200"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28920-0_2","type":"book-chapter","created":{"date-parts":[[2012,3,15]],"date-time":"2012-03-15T10:53:13Z","timestamp":1331808793000},"page":"15-38","source":"Crossref","is-referenced-by-count":7,"title":["The Art of CIIP Strategy: Tacking Stock of Content and Processes"],"prefix":"10.1007","author":[{"given":"Myriam","family":"Dunn Cavelty","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Suter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"40","volume-title":"The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation","author":"S. Collier","year":"2008","unstructured":"Collier, S., Lakoff, A.: The Vulnerability of Vital Systems: How \u2018Critical Infrastructure\u2019 Became a Security Problem. In: Dunn Cavelty, M., Kristensen, K.S. (eds.) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, pp. 40\u201362. Routledge, London (2008)"},{"key":"2_CR2","first-page":"154","volume-title":"The Routledge Handbook of New Security Studies","author":"M. Dunn Cavelty","year":"2010","unstructured":"Dunn Cavelty, M.: Cyber-Security. In: Burgess, P. (ed.) The Routledge Handbook of New Security Studies, pp. 154\u2013162. Routledge, London (2010)"},{"key":"2_CR3","unstructured":"President\u2019s Commission on Critical Infrastructure Protection. Critical Foundations. Protecting America\u2019s Infrastructures, US Government Printing Office, Washington DC (1997)"},{"key":"2_CR4","unstructured":"Brunner, E.M., Suter, M.: International CIIP Handbook 2008\/2009. Center for Security Studies, Zurich (2008)"},{"issue":"1","key":"2_CR5","first-page":"10","volume":"6","author":"S.L. Claudle","year":"2009","unstructured":"Claudle, S.L.: National Security Strategies: Security from What, from Whom, and by What Means. Journal of Homeland Security and Emergency Management\u00a06(1), 10 (2009)","journal-title":"Journal of Homeland Security and Emergency Management"},{"key":"2_CR6","first-page":"9","volume-title":"Strategy Safari: A Guided Tour Through the Wilds of Strategic Management","author":"H. Mintzberg","year":"1998","unstructured":"Mintzberg, H., Ahlstrand, B., Lampel, J.: Strategy Safari: A Guided Tour Through the Wilds of Strategic Management, p. 9. The Free Press, New York (1998)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Schneider, V., Hyner, D.: Security in Cyberspace. In: Koenig-Archibougi, M., Z\u00fcrn, M. (eds.) New Modes of Governance in the Global System. Exploring Publicness, Delegation and Inclusiveness, Palgrave MacMilllan, pp. 154\u2013176 (2005)","DOI":"10.1057\/9780230372887_7"},{"key":"2_CR8","unstructured":"US Government. Cyberspace Policy Review. Assuring a Trusted and Resilient Information and Communication Infrastructure. US Government Printing Office, Washington DC (2009)"},{"key":"2_CR9","unstructured":"Ministry of Defence of Estonia. Cyber Security Strategy. Cyber Security Strategy Committee, Tallinn, p. 8 (2008)"},{"key":"2_CR10","unstructured":"Cabinet Office of the United Kingdom. Cyber Security Strategy of the United Kingdom. Safety, Security and Resilience in Cyber Space. The Stationery Office, London, p. 9 (2009)"},{"key":"2_CR11","unstructured":"US Government, Cyberspace Policy Review, p. 2"},{"key":"2_CR12","volume-title":"Cyberspace and the National Security of the United Kingdom. Threats and Responses","author":"P. Cornish","year":"2009","unstructured":"Cornish, P., Hughes, R., Livingstone, D.: Cyberspace and the National Security of the United Kingdom. Threats and Responses. Chatham House, London (2009)"},{"key":"2_CR13","unstructured":"Homeland Security Council. National Strategy for Homeland Security. US Government Printing Office, Washington DC, p. 1 (2007)"},{"key":"2_CR14","unstructured":"Ibid, p. 26"},{"key":"2_CR15","unstructured":"Dutch Ministry of the Interior and Kingdom Relation. National Security Strategy and Work Programme 2007-2008. Broese & Peereboom, The Hague, p. 16 (2007)"},{"key":"2_CR16","unstructured":"Ibid, p.13"},{"key":"2_CR17","unstructured":"Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure. Public Safety Canada, Ottawa, p. 25 (2009)"},{"key":"2_CR18","unstructured":"Cabinet Office of the United Kingdom. The National Security Strategy of the United Kingdom. Security in an Interdependent World. The Stationery Office, London p. 5 (2008)"},{"key":"2_CR19","unstructured":"Ibid, p. 26"},{"key":"2_CR20","unstructured":"Department of Homeland Security. National Infrastructure Protection Plan. Partnering to Enhance Protection and Resiliency. Government Printing Office, Washington DC, p. 1 (2009)"},{"key":"2_CR21","unstructured":"Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure p. 1 (2008)"},{"key":"2_CR22","unstructured":"Australian Government. Critical Infrastructure Resilience Strategy. Commonwealth of Australia, Barton, pp. 3ff (2010)"},{"key":"2_CR23","unstructured":"Brunner, E., Giroux, J.: Resilience: A Tool for Preparing and Managing Emergencies. CSS Analyses in Security Policy, No. 60, p. 1 (2009)"},{"key":"2_CR24","unstructured":"For a complete list of the sector-specific agencies, see: Department of Homeland Security, National Infrastructure Protection Plan, p. 19"},{"key":"2_CR25","unstructured":"Other plans can be retrieved, \n                    \n                      http:\/\/www.dhs.gov\/files\/programs\/gc_1179866197607.shtm"},{"key":"2_CR26","unstructured":"Department of Homeland Security. Information Technology. Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan. Government Printing Office, Washington DC, p. 11ff (2007)"},{"key":"2_CR27","unstructured":"Bundesministerium des Innern. Umsetzungsplan KRITIS des nationalen Plans zum Schutz der kritischen Informationsinfrastrukturen. Publikationsversand der Bundesregierung, Rostock (2007)"},{"key":"2_CR28","unstructured":"Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12f"},{"key":"2_CR29","unstructured":"Swedish Civil Contingency Agency. Information Security in Sweden: Situational Assessment 2008. MSB, Karlstad, p. 3 (2008)"},{"key":"2_CR30","unstructured":"US Government, Cyberspace Policy Review, p. 2; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10"},{"key":"2_CR31","unstructured":"US Government, Cyberspace Policy Review, p. 1"},{"key":"2_CR32","unstructured":"Swedish Civil Contingency Agency, Information Security in Sweden, p. 3"},{"key":"2_CR33","unstructured":"Cabinet Office of the United Kingdom , Cyber Security Strategy, pp. 14"},{"key":"2_CR34","unstructured":"US Government, Cyberspace Policy Review, p. 8"},{"key":"2_CR35","unstructured":"Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.8"},{"key":"2_CR36","unstructured":"Ibid"},{"key":"2_CR37","unstructured":"Ibid.: p. vii"},{"key":"2_CR38","unstructured":"Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12ff"},{"key":"2_CR39","unstructured":"Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10"},{"key":"2_CR40","unstructured":"Swedish Civil Contingency Agency, Information Security in Sweden, p. 17"},{"key":"2_CR41","unstructured":"Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.17"},{"key":"2_CR42","unstructured":"Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 12; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10; Swedish Civil Contingency Agency, Information Security in Sweden, p. 17"},{"key":"2_CR43","unstructured":"President\u2019s Commission on Critical Infrastructure Protection, Critical Foundations, p. x"},{"key":"2_CR44","unstructured":"US Government, Cyberspace Policy Review, p. 18"},{"issue":"4","key":"2_CR45","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ijcip.2009.08.006","volume":"2","author":"M. Dunn Cavelty","year":"2009","unstructured":"Dunn Cavelty, M., Suter, M.: Public-Private Partnerships are no Silver Bulled: An Expanded Governance Model For Critical Infrastructure Protection. International Journal of Critical Infrastructure Protection\u00a02(4), 179\u2013187 (2009)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"2_CR46","unstructured":"US Government, Cyberspace Policy Review, p. 38"},{"key":"2_CR47","unstructured":"Commission of the European Communities. Protecting Europe from Large Scale Cyber-attacks and Disruptions: Enhancing Preparedness, Security and Resilience. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of Regions, Brussels, p. 6. (2009)"},{"key":"2_CR48","unstructured":"Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.15"},{"key":"2_CR49","unstructured":"Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 9"},{"key":"2_CR50","unstructured":"Obama followed this suggestion and appointed Howard Schmidt as the first cybersecurity coordinator of the White House in December 2009. Cf. The White House Blog (December 22, 2009), \n                    \n                      http:\/\/www.whitehouse.gov\/blog\/2009\/12\/22\/introducing-new-cybersecurity-coordinator"},{"key":"2_CR51","unstructured":"Up to now (Spring 2010) this center is still planned but not yet implemented. Cf. Infosecurity Magazine (March 12 2010), \n                    \n                      http:\/\/www.infosecurity-magazine.com\/view\/8020\/uk-government-cyber-security-operations-centre-going-live-soon\/"},{"key":"2_CR52","unstructured":"Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 16"},{"key":"2_CR53","unstructured":"President\u2019s Commission on Critical Infrastructure Protection, Critical Foundations, p. xi"},{"key":"2_CR54","unstructured":"US Government, Cyberspace Policy Review, pp. 13f"},{"key":"2_CR55","unstructured":"Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 18"},{"key":"2_CR56","unstructured":"Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p. 34"},{"key":"2_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09764-0","volume-title":"Global Initiatives to Secure Cyberspace. An Emerging Landscape","author":"M. Portnoy","year":"2009","unstructured":"Portnoy, M., Goodman, S.: Global Initiatives to Secure Cyberspace. An Emerging Landscape. Springer, New York (2009)"},{"key":"2_CR58","unstructured":"NATO Parliamentary Assembly. NATO and Cyber Defence. Committee Report of the 2009 Annual Session, Bruxelles, \u00a738 (2009)"},{"key":"2_CR59","unstructured":"Such as, e.g: Department of Homeland Security. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization and Protection. US Government Printing Office, Washington DC (2003)"},{"key":"2_CR60","first-page":"82","volume-title":"Critical Path. A Brief History of Critical Infrastructure Protection in the","author":"K. Ann Brown","year":"2006","unstructured":"Ann Brown, K.: Critical Path. A Brief History of Critical Infrastructure Protection in the, p. 82. George Mason University, Washington DC (2006)"},{"key":"2_CR61","unstructured":"https:\/\/www.navi-online.nl\/content\/24\/SOVI+werkgroep\n                    \n                    \n                   (in Dutch)"},{"key":"2_CR62","unstructured":"http:\/\/www.dhs.gov\/files\/committees\/editorial_0353.shtm"},{"key":"2_CR63","unstructured":"http:\/\/www.tisn.gov.au\/www\/tisn\/content.nsf\/Page\/The_TISN"},{"key":"2_CR64","unstructured":"http:\/\/www.dhs.gov\/files\/programs\/gc_1179866197607.shtm"},{"key":"2_CR65","unstructured":"Bundesministerium des Innern, Umsetzungsplan KRITIS."},{"key":"2_CR66","unstructured":"http:\/\/www.itaa.org\/information-security"}],"container-title":["Lecture Notes in Computer Science","Critical Infrastructure Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28920-0_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:15:30Z","timestamp":1620112530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28920-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642289194","9783642289200"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28920-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}